"Kevin O'Connor" <kevin@koconnor.net> wrote on 02/01/2016 04:50:22 PM:

>
> On Fri, Jan 22, 2016 at 03:27:28PM -0500, Stefan Berger wrote:
> > "Kevin O'Connor" <kevin@koconnor.net> wrote on 01/21/2016 05:37:29 PM:
> > > Thanks Stefan.  In general it looks good to me.  I have a few
> > > comments, which I'll send separately.  All of my comments could be
> > > addressed after committing this series if desired.
> >
> > I can address those comments and repost a V2 with the 10th patch adding
> > the part for the logging.
>
> Hi Stefan.  Sorry for the delay in responding.  I have a couple of
> comments on the new patch series which I will respond with separately.
>
> > > How does one test and/or use this support?  Does QEMU have support, or
> > > is there hardware available on coreboot with the tpm2 hardware?
> >
> > I did all the testing of these patches with the vTPM with CUSE interface
> > integrated into QEMU. Unfortunately the vTPM-QEMU integration train seems
> > a wreck now following comments on QEMU mailing list. So, I don't know of
> > any TPM 2 hardware out there, less so hardware where coreboot runs. So
> > that's probably currently the number one problem.
>
> Normally, I prefer to wait until upstream has committed the equivalent
> patches.  I think there is some leeway here, however, because this
> series could be considered as adding support for additional hardware.
>
> That said, if you don't know of any TPM2 hardware that is shipping, it
> does raise the possibility that the specs might change by the time
> actual hardware does ship.  What is your feel for the trade-off
> between merging now and merging after actual implementations exist?


TPM 2 is a published TCG and ISO/IED 11889:2015 standard now.

http://www.trustedcomputinggroup.org/resources/tpm_library_specification

Devices with TPM 2 are also shipping:

http://store.hp.com/us/en/pdp/hp-elitebook-folio-1020-g1-notebook-pc-%28energy-star%29-p-l4a53ut-aba--1
http://www.notebookcheck.net/Dell-XPS-13-Ultrabook-Review.136793.0.html



>
> > You know the TPM 1.2 PC BIOS specification, right? I think we can say that
> > many of the functions implemented in this series for TPM 2 are necessary
> > because of how it's done for TPM 1.2 as well as properties of the TPM 2
> > device. This includes the TPM initialization, S3 support, setting of
> > timeouts, menu items, etc. The problem with TPM 2 is that there's no
> > official spec for TPM 2 for a BIOS. So it's not quite clear to me how much
> > leeway we have to go about this in the areas of ACPI tables for logging
> > and the API. Regarding these topics:
> >
> > ACPI tables for logging: The (U)EFI specification for TPM 2 don't require
> > a TCPA table with the logging area because there seems to be an API for
> > the OS for retrieving the log. UEFI seems to log into just some buffer,
> > not connected to any ACPI table. For the BIOS we would still need that
> > TCPA table. QEMU currently provides that. The Linux kernel (and all other
> > OSes -- uuuh) would then have to allow a TCPA table for logging for TPM 2
> > even though we cannot point to a spec for that. Not sure whether we can
> > create a standard for this little gap here...
>
> It sounds like the creators of the spec assumed only EFI machines
> would have a TPM2 device.  Unless there is evidence that OSes will
> accept the ACPI/TCPA table in the new format, I'd be inclined to leave
> it in the old format.


I think the format goes with the TPM 2. We should be able to log into the TCPA table. It wouldn't make sense to come up with a new table and the logging format should be TPM 2 specific.

>
> > BIOS API: Some functions pass the entry to write into the log via the
> > function directly. Patch 10 handles that and transforms that entry into
> > the log entry format as required for TPM 1.2 or TPM 2 (log entries are
> > differently formatted for TPM 1.2 and for TPM 2). So the only remaining
> > problem I know of is the function that allows one to pass TPM commands
> > through to the TPM. This may end up causing problems in the application if
> > it was written for TPM 1.2 and now there's a TPM 2 running underneath,
> > which doesn't understand the TPM 1.2 commands. I would say this is likely
> > the smaller of the problems also considering that there are not many
> > applications out there that use that API call. Possibility to just shut
> > down that function call is certainly there.
>
> I'd say returning an error code for pass-through command requests is
> the safest solution.


TPM 1.2 and TPM 2 commands all differ in the tag field. We could filter by that and return an error if the tag is not for the underlying TPM.

   Stefan



>
> -Kevin
>